C. Look for subject lines that are from known virus attacks.
A. To compare a file to known virus attributes
D. Terminate and stay resident programs, which stay in memory after you shut them down
B. Heuristic scanning
C. Heuristic firewall
A. Screening firewall
A. SIEM
A. Stateful packet inspection
D. Screened host
A. Its security depends on the underlying operating system.
A. Preemptive blocking
A. Honey pot
A. Intrusion deterrence
A. Anomaly detection
B. By looking for known spyware